×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [source of attack slide]
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy
216 views
Real-Time Intrusion Detection with Emphasis on Insider Attacks Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Polytechnic University
221 views